Protecting networks against diffusive attacks: game-theoretic resource allocation for contagion mitigation

Many real-world situations involve attempts to spread influence through a social network. For example, viral marketing is when a marketer selects a few people to receive some initial advertisement in the hopes that these `seeds' will spread the news. Even peacekeeping operations in one area have been shown to have a contagious effect on the neighboring vicinity. Each of these domains also features multiple parties seeking to maximize or mitigate a contagious effect by spreading its own influence among a select few seeds, naturally yielding an adversarial resource allocation problem. My work models the interconnected network of people as a graph and develops algorithms to optimize resource allocation in these networked competitive contagion scenarios. Game-theoretic resource allocation in the past has not considered domains with both a networked structure and contagion effects, rendering them unusable in critical domains such as rumor control, counterinsurgency, and crowd management. Networked domains without contagion effects already present computational challenges due to the large scale of the action space. To address this issue, my first contribution proposed efficient game-theoretic allocation algorithms for the graph-based urban road network domain. This work still provides the only polynomial-time algorithm for allocating vehicle checkpoints through a city, giving law enforcement officers an efficient tool to combat terrorists making their way to potential points of attack. Second, I have provided the first game-theoretic treatment for contagion mitigation in social networks and given practitioners the first principled techniques for such vital concerns as rumor control and counterinsurgency. Finally, I extended my work on game-theoretic contagion mitigation to address uncertainty about the network structure to find that, contrary to what evidence and intuition suggest, heuristic sampling approaches provide near-optimal solutions across a wide range of generative graph models and uncertainty models. Thus, despite extreme practical challenges in attaining accurate social network information, my techniques remain near-optimal across numerous forms of uncertainty in multiple synthetic and real-world graph structures. Beyond optimization of resource allocation, I have further studied contagion effects to understand the effectiveness of such resources. First, I created an evacuation simulation, ESCAPES, to explore the interaction of pedestrian fear contagion and authority fear mitigation during an evacuation. Second, using this simulator, I have advanced the frontier in contagion modeling by developing empirical evaluation methods for comparing and calibrating computational contagion models that are critical in crowd simulations and evacuation modeling. Finally, I have also conducted an examination of agent-human emotional contagion to inform the rising use of simulations for personnel training in emotionally-charged situations.

[1]  Jon M. Kleinberg,et al.  Sequential Influence Models in Social Networks , 2010, ICWSM.

[2]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[3]  Shishir Bharathi,et al.  Competitive Influence Maximization in Social Networks , 2007, WINE.

[4]  D. Watts,et al.  A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.

[5]  Tibor Bosse,et al.  Multi-Agent Model For Mutual Absorption Of Emotions , 2009, ECMS.

[6]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[7]  Rajmohan Rajaraman,et al.  Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[8]  Dirk Helbing,et al.  Simulating dynamical features of escape panic , 2000, Nature.

[9]  Ramamohan Paturi,et al.  Connected Coordination: Network Structure and Group Coordination , 2009 .

[10]  Roger Wattenhofer,et al.  Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.

[11]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[12]  M. Erb,et al.  Are emotions contagious? Evoked emotions while viewing emotionally expressive faces: quality, quantity, time course and gender differences , 2001, Psychiatry Research.

[13]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[14]  Jonathan Gratch,et al.  The effect of expression of anger and happiness in computer agents on negotiations with humans , 2011, AAMAS.

[15]  Sigal G. Barsade,et al.  Group emotion: A view from top and bottom. , 1998 .

[16]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[17]  Serge P. Hoogendoorn,et al.  Gas-Kinetic Modeling and Simulation of Pedestrian Flows , 2000 .

[18]  Deborah A. Small,et al.  The Face of Need: Facial Emotion Expression on Charity Advertisements , 2009 .

[19]  N. Badler,et al.  Crowd simulation incorporating agent psychological models, roles and communication , 2005 .

[20]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[21]  Benjamin W. K. Hung Optimization-based selection of influential agents in a rural Afghan social network , 2010 .

[22]  N. Christakis,et al.  Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study , 2008, BMJ : British Medical Journal.

[23]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .

[24]  Tsai-Yen Li,et al.  Simulation of Social Behaviors in Virtual Crowd , 2010 .

[25]  L. Festinger A Theory of Social Comparison Processes , 1954 .

[26]  N. Christakis,et al.  The Spread of Obesity in a Large Social Network Over 32 Years , 2007, The New England journal of medicine.

[27]  Alexander Shapiro,et al.  On the Rate of Convergence of Optimal Solutions of Monte Carlo Approximations of Stochastic Programs , 2000, SIAM J. Optim..

[28]  Funda Durupinar From audiences to mobs: Crowd simulation with psychological factors (Kitlelerden güruhlara: Psikolojik faktörlerle kalabalık simülasyonu) , 2010 .

[29]  Timothy D. Wilson,et al.  A model of dual attitudes. , 2000, Psychological review.

[30]  R. Doherty The Emotional Contagion Scale: A Measure of Individual Differences , 1997 .

[31]  Ramamohan Paturi,et al.  Does more connectivity help groups to solve social problems , 2011, EC '11.

[32]  Asuman E. Ozdaglar,et al.  Optimization-based influencing of village social networks in a counterinsurgency , 2011, TIST.

[33]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[34]  S. Pugh,et al.  Service with a smile: Emotional contagion in the service encounter. , 2001 .

[35]  Rong Yang,et al.  Designing better strategies against human adversaries in network security games , 2012, AAMAS.

[36]  Alan M. Elkins Understanding Human Behavior for Effective Police Work , 1976 .

[37]  M. Degroot Reaching a Consensus , 1974 .

[38]  T. Schelling Micromotives and Macrobehavior , 1978 .

[39]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[40]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[41]  Tamara G. Kolda,et al.  Community structure and scale-free collections of Erdös-Rényi graphs , 2011, Physical review. E, Statistical, nonlinear, and soft matter physics.

[42]  Natalie Fridman,et al.  Comparing Human and Synthetic Group Behaviors : A Model Based on Social Psychology , 2009 .

[43]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[44]  Rajmonda Sulo Caceres,et al.  The Impact of Structural Changes on Predictions of Diffusion in Networks , 2008, 2008 IEEE International Conference on Data Mining Workshops.

[45]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[46]  Ning Wang,et al.  Rapport and facial expression , 2009, 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops.

[47]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[48]  Martin Bichler,et al.  Identification of influencers - Measuring influence in customer networks , 2008, Decis. Support Syst..

[49]  M. Schweitzer,et al.  Feeling and believing: the influence of emotion on trust. , 2003, Journal of personality and social psychology.

[50]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[51]  Nicholas J. Howard,et al.  Finding optimal strategies for influencing social networks in two player games , 2010 .

[52]  Jerome M. Chertkoff,et al.  Don't Panic: The Psychology of Emergency Egress and Ingress , 1999 .

[53]  Pierre Philippot,et al.  Facial Reactions to Emotional Facial Expressions: Affect or Cognition? , 1998 .

[54]  J. Zittartz,et al.  Cellular Automaton Approach to Pedestrian Dynamics - Applications , 2001, cond-mat/0112119.

[55]  K. Pauwels,et al.  Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .

[56]  Norman I. Badler,et al.  Creating crowd variation with the OCEAN personality model , 2008, AAMAS.

[57]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[58]  Craig A. Smith,et al.  Patterns of cognitive appraisal in emotion. , 1985, Journal of personality and social psychology.

[59]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[60]  James Aspnes,et al.  Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.

[61]  Masahiro Kimura,et al.  Extracting influential nodes on a social network for information diffusion , 2009, Data Mining and Knowledge Discovery.

[62]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[63]  L. F. Henderson On the fluid mechanics of human crowd motion , 1974 .

[64]  Sigal G. Barsade The Ripple Effect: Emotional Contagion and its Influence on Group Behavior , 2002 .

[65]  Gadi Fibich,et al.  Aggregate Diffusion Dynamics in Agent-Based Models with a Spatial Structure , 2010, Oper. Res..

[66]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[67]  T. Schelling Hockey Helmets, Concealed Weapons, and Daylight Saving , 1973 .

[68]  Kyle Beardsley,et al.  Peacekeeping and the Contagion of Armed Conflict , 2011 .

[69]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[70]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[71]  Nicola Basilico,et al.  Automated Abstractions for Patrolling Security Games , 2011, AAAI.

[72]  Joseph P. Forgas,et al.  Affective influences on individual and group judgments , 1990 .

[73]  Milind Tambe,et al.  Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.

[74]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[75]  Mark S. Granovetter Threshold Models of Collective Behavior , 1978, American Journal of Sociology.

[76]  Stacy Marsella,et al.  Virtual Rapport , 2006, IVA.

[77]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[78]  Po-An Chen,et al.  Better vaccination strategies for better people , 2010, EC '10.

[79]  David K. Perry,et al.  Viral Marketing or Electronic Word-of-Mouth Advertising: Examining Consumer Responses and Motivations to Pass Along Email , 2004, Journal of Advertising Research.

[80]  B. Rothbaum,et al.  Virtual reality exposure therapy for Vietnam veterans with posttraumatic stress disorder. , 2001, The Journal of clinical psychiatry.

[81]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[82]  Weiguo Song,et al.  A cellular automata evacuation model considering friction and repulsion , 2005 .

[83]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[84]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[85]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[86]  Alicia A. Grandey,et al.  Emotion regulation in the workplace: a new way to conceptualize emotional labor. , 2000, Journal of occupational health psychology.

[87]  John von Neumann,et al.  1. A Certain Zero-sum Two-person Game Equivalent to the Optimal Assignment Problem , 1953 .

[88]  Milind Tambe,et al.  Empirical Evaluation of Computational Emotional Contagion Models , 2011, IVA.

[89]  Xiaohong Chen,et al.  An Empirical Study of Word-of-Mouth Generation and Consumption , 2012, Mark. Sci..

[90]  Allan Borodin,et al.  Threshold Models for Competitive Influence in Social Networks , 2010, WINE.

[91]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[92]  Milind Tambe,et al.  ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison , 2011, AAMAS.

[93]  Vincent Conitzer,et al.  Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.

[94]  Yiqing Lin,et al.  Agent-Based Simulation of Evacuation: An Office Building Case Study , 2010 .

[95]  Lars-Olov Lundqvist,et al.  Factor structure of the Greek version of the Emotional Contagion Scale and its measurement invariance across gender and cultural groups , 2008 .

[96]  Helbing,et al.  Social force model for pedestrian dynamics. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[97]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[98]  Duncan J. Watts,et al.  Cooperation and Contagion in Networked Public Goods Experiments , 2010, ArXiv.

[99]  D. Farrington,et al.  Development and validation of the Basic Empathy Scale. , 2006, Journal of adolescence.

[100]  Avrim Blum,et al.  Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.

[101]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[102]  Giuseppe Riva,et al.  Virtual Reality in Psychotherapy: Review , 2005, Cyberpsychology Behav. Soc. Netw..

[103]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[104]  A. Schadschneider,et al.  Simulation of pedestrian dynamics using a two dimensional cellular automaton , 2001 .

[105]  M. Kearns,et al.  An Experimental Study of the Coloring Problem on Human Subject Networks , 2006, Science.

[106]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[107]  W. Wood,et al.  Minority influence: a meta-analytic review of social influence processes. , 1994, Psychological bulletin.

[108]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[109]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[110]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[111]  J. Kulik,et al.  Social Comparison, Affiliation, and Emotional Contagion under Threat , 2000 .

[112]  Marcelo Luis Errecalde,et al.  Evacuation simulations using cellular automata , 2007 .

[113]  Mark Hoogendoorn,et al.  An Agent-Based Model for the Interplay of Information and Emotion in Social Diffusion , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[114]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[115]  Eric Budish,et al.  IMPLEMENTING RANDOM ASSIGNMENTS : A GENERALIZATION OF THE BIRKHOFF-VON NEUMANN THEOREM , 2009 .

[116]  Mathew D. McCubbins,et al.  The Democratic Dilemma: Can Citizens Learn What They Need to Know? , 1998 .

[117]  S. Bem The measurement of psychological androgyny. , 1974, Journal of consulting and clinical psychology.

[118]  J. Cacioppo,et al.  Emotional Contagion , 1993 .

[119]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[120]  Michel C. A. Klein,et al.  Agent-Based Analysis of Patterns in Crowd Behaviour Involving Contagion of Mental States , 2011, IEA/AIE.

[121]  James Aspnes,et al.  Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network? , 2007, OPODIS.

[122]  Tibor Bosse,et al.  A Multi-agent Model for Emotion Contagion Spirals Integrated within a Supporting Ambient Agent Model , 2009, PRIMA.